how does aem prevents sql injection? | Community
Skip to main content
This post is no longer active and is closed to new replies. Need help? Start a new post to ask your question.
Best answer by BrianKasingli

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

5 replies

Bhuwan_B
Community Advisor
Community Advisor
April 27, 2022
Anish-Sinha
Adobe Employee
Adobe Employee
April 27, 2022
arunpatidar
Community Advisor
Community Advisor
April 27, 2022

Please note that JCR SQL injections != RDBMS SQL injections. SQL in JCR is strictly read-only. As far as it is possible to manipulate a query the only risk is information leakage. No data can be manipulated as is the case with RDBMSes.

 

Arun Patidar
sourcedcode
Level 2
April 28, 2022

.

BrianKasingli
Community Advisor and Adobe Champion
BrianKasingliCommunity Advisor and Adobe ChampionAccepted solution
Community Advisor and Adobe Champion
April 28, 2022

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

maryani
Level 2
March 27, 2023

Hi 

How can we prevent blind XPath injection for an AEM page??

 

Thanks

 

April 5, 2024

I have got a similar vulnerbility in our latest report. Did you find any solution for this?